Mgetty Project Mgetty 1.1.28

CPE Details

Mgetty Project Mgetty 1.1.28
1.1.28
2023-12-29
09h15 +00:00
2023-12-29
09h15 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:mgetty_project:mgetty:1.1.28:*:*:*:*:*:*:*

Informations

Vendor

mgetty_project

Product

mgetty

Version

1.1.28

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2019-1010189 2019-07-24 11h16 +00:00 mgetty prior to version 1.2.1 is affected by: Infinite Loop. The impact is: DoS, the program does never terminates. The component is: g3/g32pbm.c. The attack vector is: Local, the user should open a specially crafted file. The fixed version is: 1.2.1.
5.5
Medium
CVE-2019-1010190 2019-07-24 10h11 +00:00 mgetty prior to 1.2.1 is affected by: out-of-bounds read. The impact is: DoS, the program may crash if the memory is not mapped. The component is: putwhitespan() in g3/pbm2g3.c. The attack vector is: Local, the victim must open a specially crafted file. The fixed version is: 1.2.1.
5.5
Medium
CVE-2018-16741 2018-09-13 14h00 +00:00 An issue was discovered in mgetty before 1.2.1. In fax/faxq-helper.c, the function do_activate() does not properly sanitize shell metacharacters to prevent command injection. It is possible to use the ||, &&, or > characters within a file created by the "faxq-helper activate " command.
7.8
High
CVE-2018-16742 2018-09-13 14h00 +00:00 An issue was discovered in mgetty before 1.2.1. In contrib/scrts.c, a stack-based buffer overflow can be triggered via a command-line parameter.
7.8
High
CVE-2018-16743 2018-09-13 14h00 +00:00 An issue was discovered in mgetty before 1.2.1. In contrib/next-login/login.c, the command-line parameter username is passed unsanitized to strcpy(), which can cause a stack-based buffer overflow.
7.8
High
CVE-2018-16744 2018-09-13 14h00 +00:00 An issue was discovered in mgetty before 1.2.1. In fax_notify_mail() in faxrec.c, the mail_to parameter is not sanitized. It could allow for command injection if untrusted input can reach it, because popen is used.
7.8
High
CVE-2018-16745 2018-09-13 14h00 +00:00 An issue was discovered in mgetty before 1.2.1. In fax_notify_mail() in faxrec.c, the mail_to parameter is not sanitized. It could allow a buffer overflow if long untrusted input can reach it.
7.8
High
CVE-2003-0517 2003-07-10 02h00 +00:00 faxrunqd.in in mgetty 1.1.28 and earlier allows local users to overwrite files via a symlink attack on JOB files.
5.5
Medium